Re: [PATCH] mm: Revert x86_64 and arm64 ELF_ET_DYN_BASE base

2024-02-19 Thread 'Dmitry Vyukov' via address-sanitizer
#define ELF_ET_DYN_BASE (mmap_is_ia32() ? 0x000400000UL : \ > > - 0x1UL) > > + (TASK_SIZE / 3 * 2)) > > > > /* This yields a mask that user programs can use to figure

Re: Over write store instruction and purpose of -fsanitize=address

2024-02-12 Thread 'Alexander Potapenko' via address-sanitizer
tend to over write the store instruction in similar manner as done > address sanitizer. > In that quest, I want to know what exactly does option "-fsanitize=address" > do and is there any way I can just pass on the custom code to store > instruction. > > I would rea

Re: Custom ASAN runtime for a non-posix OS

2023-02-06 Thread 'Vitaly Buka' via address-sanitizer
;> I do not see any globals that I should have initialized, is there >>> something obvious that I am missing or binary instrumentation itself is >>> tightly coupled with Linux so reimplementing callbacks is not enough? >>> >>> Thank you! >>> >>>

Re: Custom ASAN runtime for a non-posix OS

2023-02-06 Thread 'Vitaly Buka' via address-sanitizer
ank you! > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsubscr...@googlegroups.com. > To view this disc

Re: kpatch and kasan

2023-01-19 Thread 'Dmitry Vyukov' via address-sanitizer
first thing. > > > > Exactly. At Red Hat, we typically wait for a corresponding kernel fix > to pass tests before starting on our kpatch conversion (emergency CVEs > aside) ... that way we're usually confident with the overall changes > before we even start our work. > >

Re: MTE enabled hardware

2022-10-01 Thread 'Koschel, J. (Jakob)' via address-sanitizer
> On 1. Oct 2022, at 15:15, 'Dmitry Vyukov' via address-sanitizer > wrote: > > On Sat, 1 Oct 2022 at 14:25, 'Koschel, J. (Jakob)' via > address-sanitizer wrote: >> >> Hey, >> >> it was worth a shot, after Dmitry suggested to try here ;) >> R

Re: MTE enabled hardware

2022-10-01 Thread 'Dmitry Vyukov' via address-sanitizer
On Sat, 1 Oct 2022 at 14:25, 'Koschel, J. (Jakob)' via address-sanitizer wrote: > > Hey, > > it was worth a shot, after Dmitry suggested to try here ;) > Regardless thanks for your reply, I guess I'll have to wait a bit more. Just in case: you considered using qemu, right? >

Re: MTE enabled hardware

2022-10-01 Thread 'Koschel, J. (Jakob)' via address-sanitizer
ely, we are not aware of any publicly available device with usable > MTE. > Please pester your hardware suppliers directly, or wait :) > > --kcc > > > > On Thu, Sep 29, 2022 at 3:08 PM 'Jakob K.' via address-sanitizer > wrote: > Hi all, > > I'm

MTE enabled hardware

2022-09-29 Thread 'Jakob K.' via address-sanitizer
the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/address-sanitizer/01cba890-

Re: Thread Sanitizer could not print proper stack trace.

2021-10-05 Thread 'Dmitry Vyukov' via address-sanitizer
(skvbc_replica+0xdd1e7a) > > #20 (skvbc_replica+0xdd2d5a) > > #21 (libc.so.6+0x21bf6) > > > > Thread T73 (tid=739, running) created by main thread at: > > #0 (skvbc_replica+0xd4019b) > > #1 (libstdc++.so.6+0xbd994) > > #2 (skv

Re: Asan initialization broken on Android?

2021-07-20 Thread 'Dmitry Vyukov' via address-sanitizer
options.cpp (75 of 1460) >> > PASS: AddressSanitizer-arm-android :: TestCases/Linux/clone_test.cpp (76 >> > of 1460) >> > PASS: AddressSanitizer-arm-android :: >> > TestCases/Linux/new_delete_mismatch_global.cpp (77 of 1460) >> > PASS: AddressSanitizer-arm

Re: Asan initialization broken on Android?

2021-07-20 Thread 'Evgenii Stepanov' via address-sanitizer
ressSanitizer-arm-android :: > TestCases/Linux/printf-fortify-1.c (82 of 1460) > > UNSUPPORTED: AddressSanitizer-arm-android :: > TestCases/Linux/printf-fortify-2.c (83 of 1460) > > UNSUPPORTED: AddressSanitizer-arm-android :: > TestCases/Linux/printf-fortify-3.c (84 of 1460)

Asan initialization broken on Android?

2021-07-20 Thread 'Dmitry Vyukov' via address-sanitizer
x/pthread_create_from_constructor.cpp (87 of 1460) > PASS: AddressSanitizer-arm-android :: TestCases/Linux/clang_gcc_abi.cpp (88 > of 1460) > PASS: AddressSanitizer-arm-android :: > TestCases/Linux/new_delete_mismatch_stack.cpp (89 of 1460) > XFAIL: AddressSanitizer-arm-android :: TestCase

Re: Is there any reason to implement our malloc/free with exactly the same signature as library ones?

2021-04-13 Thread 'Dmitry Vyukov' via address-sanitizer
On Tue, Apr 13, 2021 at 11:55 AM Wei Chen wrote: > > Hi all, > > I'm recently learning Address Sanitizer code and learned that the runtime > library is designed to replace the glibc malloc/free with our customized ones > so that we can insert red zone before and after th

Re: Enabling Address Sanitizer in AudioFlinger

2021-02-09 Thread 'Vy Nguyen' via address-sanitizer
t;> * Leak detection is done when a program exits, which audioflinger never >> does. There is an API to force a leak check at runtime. >> >> >> On Mon, Feb 8, 2021 at 10:05 PM varsha vanga >> wrote: >> >>> >>> Hi, >>> I am trying to u

Re: Enabling Address Sanitizer in AudioFlinger

2021-02-09 Thread 'Evgenii Stepanov' via address-sanitizer
wrote: > > Hi, > I am trying to use the address sanitizer tool in Android AOSP -(Android > 10.) > I am trying to check the possible memory leaks in AudioFlinger. > > I have added the foll. code in Android.bp file > (frameworks/av/services/audioflinger/Android.bp) >

Debugging "nested bug in the same thread"

2021-01-18 Thread 'Maksim Ivanov' via address-sanitizer
m -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. To view this discussion on the web visit h

Re: Crash in application's startup code around Asan red zone

2021-01-15 Thread 'Evgenii Stepanov' via address-sanitizer
>>> ==3933371==Installed the sigaction for signal 7 >>> ==3933371==Installed the sigaction for signal 8 >>> ==3933371==SetCurrentThread: 0x77576000 for thread 0x771b1bc0 >>> ==3933371==T0: stack [0x7f7ff000,0x7ffff000) size 0x80; >&g

Re: Crash in application's startup code around Asan red zone

2021-01-15 Thread 'Evgenii Stepanov' via address-sanitizer
t;>>0x5578cbd5 <+181>:mov$0x1,%ebx >>>... >>> >>> (gdb) info registers >>> rax0x5578cb20 0x5578cb20 >>> rbx0x0 0x0 >>> rcx0x7fffd

Re: Crash in application's startup code around Asan red zone

2021-01-15 Thread 'Evgenii Stepanov' via address-sanitizer
fddc0 > r8 0x0 0x0 > r9 0x1 0x1 > r100x77438b0f 0x77438b0f > r110x5578e5e0 0x5578e5e0 > r120x20 0x20 > r130x200x20 > r1

Re: ASAN: Unable to find a memory range after restricting VM on IOS

2020-10-01 Thread 'Dan Liew' via address-sanitizer
ank you, > Rodrigo > > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsubscr...@googlegroups.com

Re: TSan "Nested bug" intermittent failure

2020-07-18 Thread 'Dmitry Vyukov' via address-sanitizer
; looking at all fixes). > > > > I see several reasonable next steps: > > 1. Add a test with an extremely large function name in a report > > (should be doable with some C++ recursive template magic). Wonder how > > compilers handle function name >16K > > Ju

Re: Create empty report file by default

2020-07-14 Thread 'Vitaly Buka' via address-sanitizer
e opinion in this regard. > > Thanks, > Namit Gupta > > > > > > -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email t

Re: KLSAN

2020-06-13 Thread 'Dmitry Vyukov' via address-sanitizer
by both LSAN and KMEMLEAK looks much more simple and robust to me. I can imagine a compiler providing some aid for that, like register/memory slot lifetime markers, some type info, but all of that only fights false negatives, so I would consider it as an optional addition only. -- You received th

Re: TSan "Nested bug" intermittent failure

2020-05-06 Thread 'Dmitry Vyukov' via address-sanitizer
ome insight into what happens. -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. To view this discussion on the w

Re: [PATCH] D78111: tsan: fixes to ThreadClock::releaseStoreAcquire

2020-04-16 Thread 'Dmitry Vyukov' via address-sanitizer
u can now land this yourself, right? > > > CHANGES SINCE LAST ACTION > https://reviews.llvm.org/D78111/new/ > > https://reviews.llvm.org/D78111 > > > > -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To

Re: SEGV in glibc's _int_free(), without use of RTLD_DEEPBIND

2020-03-27 Thread 'Evgenii Stepanov' via address-sanitizer
ted source code? > If you can show that this thing that is being freed has been allocated with ASan's malloc, then certainly. > Zach > > On Thu, Mar 26, 2020 at 3:39 PM 'Evgenii Stepanov' via address-sanitizer < > address-sanitizer@googlegroups.com> wrote: > >> This might h

Re: SEGV in glibc's _int_free(), without use of RTLD_DEEPBIND

2020-03-26 Thread 'Evgenii Stepanov' via address-sanitizer
> (/lan/sig/cm/cds/19.00MainQt_asan/19.00.0321/tools.lnx86/bin/hyb_engd.exe+0x9c5c97c) >> #7 0x3064a1ecef in __libc_start_main (/lib64/libc.so.6+0x3064a1ecef) >> #8 0x413d54 >> (/lan/sig/cm/cds/19.00MainQt_asan/19.00.0321/tools.lnx86/bin/hyb_engd.exe+0x413d54) >> >> Add

Re: SEGV in glibc's _int_free(), without use of RTLD_DEEPBIND

2020-03-26 Thread 'Evgenii Stepanov' via address-sanitizer
> (/lan/sig/cm/cds/19.00MainQt_asan/19.00.0321/tools.lnx86/bin/hyb_engd.exe+0x413d54) > > AddressSanitizer can not provide additional info. > SUMMARY: AddressSanitizer: SEGV (/lib64/libc.so.6+0x3064a78d26) in > _int_free > ==47276==ABORTING > > Thanks, > Zach > > -- >

Re: ASAN read-only poisoned by user shadow byte

2019-12-12 Thread 'Alexander Potapenko' via address-sanitizer
ld be useful: >> > >> > enum { >> > IS_INT, >> > IS_FLOAT >> > }; >> > struct foo { >> > int type; >> > union { int i; float f }; >> > }; >> > >> > struct foo* create_int_foo(int i) { &g

Re: Which comes first, and does one override the other?

2019-06-01 Thread 'David Barto' via address-sanitizer
Thanks. That explains some of the 'weirdness' that I've been seeing. David On Friday, May 31, 2019 at 6:53:13 PM UTC-7, kcc wrote: > > The env overrides __asan_default_options. > > --kcc > > On Fri, May 31, 2019 at 1:03 PM 'David Barto' via address-san

Which comes first, and does one override the other?

2019-05-31 Thread 'David Barto' via address-sanitizer
ASAN_OPTIONS from the environment __asan_default_options from the program it self? Does one override the other, or can __asan_default_options enhance/extend the environment variable? David -- You received this message because you are subscribed to the Google Groups "address-sani

Re: How much extra memory do ASAN builds use?

2019-05-02 Thread 'Evgenii Stepanov' via address-sanitizer
. > > Is this still current? > > Thanks! > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsu

Re: Suppression of stack-buffer-overflow

2019-03-22 Thread 'Alexander Potapenko' via address-sanitizer
gt; leaf1> 27 (1792): total: 128 K allocs: 36 remains: 36 > leaf1> 28 (2048): total: 128 K allocs: 32 remains: 32 > leaf1> 29 (2560): total: 128 K allocs: 50 remains: 50 > leaf1> 30 (3072): total: 128 K allocs: 21 remains: 21 > leaf1> 31 (3584): total: 128

Re: ASAN on embedded platform (Cortex-M) ?

2019-03-19 Thread 'Alexander Potapenko' via address-sanitizer
.g. a breakpoint on error, > or transfer data to a PC for calculations (but what would be the required > bandwidth ?) but that would require developing a dedicated GUI/app. > > > > Any advice ? > > > > Thomas. > > -- > You received this message because you are s

Re: ASAN - How to suppress strlen Error ?

2019-02-19 Thread 'Alexander Potapenko' via address-sanitizer
ptor_strlen.part.24 () from > /lib64/libasan.so. > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsubscr...

Re: Integrate Address Sanitizer into Android N

2019-02-06 Thread 'Evgenii Stepanov' via address-sanitizer
; I got the libasan_intermediates for host, but not for target, even the > makefile mentions that these are generated for host. > > Can anyone please suggest me how to build the asan for target. Thanks in > advance. > > Thanks, > Harinath > > -- > You received this message becaus

Re: detect_stack_use_after_return OPTION

2018-12-30 Thread 'Kuba Mracek' via address-sanitizer
17440 abort ~/FOT/igraph-asan/install/lib/igraph.harness.out > ``` > > However when `detect_stack_use_after_return=1`, there is no crash report at > all. > > I will debug with the input to see the exact root cause of the crash; and if > required, I can

Re: __asan_default_options not called

2018-12-18 Thread 'Dmitry Vyukov' via address-sanitizer
/logs.txt"; > } > > Any idea? extern "C"? -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: "failed to allocate" and "unknown-crash"

2018-12-03 Thread 'Evgenii Stepanov' via address-sanitizer
eeded_size > kMaxAllowedMallocSize) { > Report("WARNING: AddressSanitizer failed to allocate %p bytes\n", > > How is the kMaxAllowedMallocSize decided? > > Thanks. > Xingyan > > > > -- > You received this message because you are subscribed to the Google Grou

Re: UBSAN - call on misaligned address which requires 128 byte alignment - for false sharing prevention

2018-10-10 Thread 'Reid Kleckner' via address-sanitizer
hy this is occuring; 2) > and how to properly write the code to make the error go away. (Note: my > motivation for the alignas attributes is to prevent false sharing between r > and w as this class is used by concurrent threads.) > > -- > You received this message because you are subsc

Re: Performance slowdown of ASAN

2018-09-04 Thread 'Evgenii Stepanov' via address-sanitizer
Hi all, >> >> We are running a few experiments to try to predict the performance >> slowdown of Address Sanitizer. Our hypothesis is that an executable with >> more memory accesses would take longer than one with fewer. We tried to >> correlate the number of loads/sto

Re: Intermittent 'AddressSanitizer CHECK failed' error

2018-03-27 Thread isarkisov via address-sanitizer
alekseys and I have been working on this offline, will update as soon as we figure this out. Thanks! On Monday, March 26, 2018 at 4:58:25 PM UTC-7, kcc wrote: > > +alekseys, who has been touching this code recently. > > On Mon, Mar 26, 2018 at 12:24 PM, isarkisov via addre

Intermittent 'AddressSanitizer CHECK failed' error

2018-03-26 Thread isarkisov via address-sanitizer
long, unsigned char const&) external/libcxx/include/vector:1099 -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@g

Re: [compiler-rt] Use of ESR context in AArch64 sigframe

2018-03-07 Thread 'Dmitry Vyukov' via address-sanitizer
m userspace will be reported as UNKNOWN. >> >> Is this likely to cause a problem? > > I guess this shouldn't be a bid deal. > AFAICS compiler-rt uses this information only in diagnostic message. +address-sanitizer mailing list Hi, These diagnostic messages are then parsed and analyzed,

Re: [Suggestion] Runtime sanitizer, or minimal sanitized binary

2018-03-07 Thread 'Dmitry Vyukov' via address-sanitizer
g) struct file_operations->ioctl() ==> kernel_driver_ioctl() > --> I have to find more condition.. >2), 3) are same to "For linux kernel" >==> Output : Minimal sanitized kernel driver. > >** User-supplied list can be an easiest way as I think. This looks too complex to be practical. -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: [Suggestion] Runtime sanitizer, or minimal sanitized binary

2018-03-06 Thread 'Dmitry Vyukov' via address-sanitizer
ant o extract this list of functions? Or you mean that user supplies the list? -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: [EXTERNAL]: Issues booting ASAN enabled build even with "mm: Revert x86_64 and arm64 ELF_ET_DYN_BASE base" applied

2017-10-26 Thread 'Evgenii Stepanov' via address-sanitizer
n the > ASan side. > > On Thu, Oct 26, 2017 at 7:59 AM, 'Dmitry Vyukov' via address-sanitizer > <address-sanitizer@googlegroups.com> wrote: >> Hi, >> >> I am missing some context. >> How can this be reproduced? What is the user-space program? Is it >>

Re: [EXTERNAL]: Issues booting ASAN enabled build even with "mm: Revert x86_64 and arm64 ELF_ET_DYN_BASE base" applied

2017-10-26 Thread 'Dmitry Vyukov' via address-sanitizer
t;> > still running into issues. It appears that 32 bit processes are having an >> > issue. >> > Logcat attached. >> > > >> > > Have you seen this issue yet? The only solution we have so far is to do a >> > complete revert of above mentioned changes. &g

Re: Question on expected sanitizer operation

2017-10-23 Thread 'Matt Morehouse' via address-sanitizer
r is it merely > response to actual reads and writes? > > Thank you, > Rick C. Hodgin > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, sen

Re: sanitizer_posix.cc:131 "(("unable to unmap" && 0)) != (0)" (0x0, 0x0)

2017-10-20 Thread 'Kostya Serebryany' via address-sanitizer
com> wrote: > On Thu, Oct 19, 2017 at 10:56 PM, <chett...@gmail.com> wrote: > > Hi Martin, > > I am having the same issue too, it seems to be a real issue in the > address > > sanitizer: https://github.com/apache/trafficserver/issues/1498. > > > > In

Re: sanitizer_posix.cc:131 "(("unable to unmap" && 0)) != (0)" (0x0, 0x0)

2017-10-19 Thread 'Dmitry Vyukov' via address-sanitizer
On Thu, Oct 19, 2017 at 10:56 PM, <chett...@gmail.com> wrote: > Hi Martin, > I am having the same issue too, it seems to be a real issue in the address > sanitizer: https://github.com/apache/trafficserver/issues/1498. > > In my case I am running a C++ component on RHEL 6

Re: LSan not reporting leaks on Android N

2017-10-04 Thread 'Evgenii Stepanov' via address-sanitizer
LSan is not enabled on Android, see https://github.com/google/sanitizers/issues/379 It's kind of on our TODO list, but I can not say when we might finally get to it. On Wed, Oct 4, 2017 at 2:48 PM, 'Primiano Tucci' via address-sanitizer <address-sanitizer@googlegroups.com> wrote: > H

LSan not reporting leaks on Android N

2017-10-04 Thread 'Primiano Tucci' via address-sanitizer
test.o obj/buildtools/googletest/googletest/src/gtest.gtest-all.o obj/buildtools/googletest/googletest/src/gtest_main.gtest_main.o -llog -lgcc -lc++_static -lc++abi -landroid_support -o sanitizers_unittests -- You received this message because you are subscribed to the Google Groups "add

Re: is that false alarm of "container-overflow"?

2017-08-22 Thread 'Evgenii Stepanov' via address-sanitizer
r::Fuzzer::RunOne(unsigned char const*, >>> unsigned long, bool, fuzzer::InputInfo*) >>> (decode_fuzz_test:x86_64+0x1000fd553) >>> #19 0x10f3ff200 in fuzzer::Fuzzer::MutateAndTestOne() >>> (decode_fuzz_test:x86_64+0x100104200) >>> #20 0x10f3ffac2 in fuzzer::Fuzzer::Loop

Re: is that false alarm of "container-overflow"?

2017-08-22 Thread 'Evgenii Stepanov' via address-sanitizer
>repair.pData = NULL; > > } > > it = m_packets.erase(it); > > } else { > > ++it; > > } > > } > > > Thanks > > > -- > You received this message because you are subscribed to the Google Grou

Re: Extending LSAN to report where memory is leaked?

2017-08-17 Thread 'Evgenii Stepanov' via address-sanitizer
ould require > compiler instrumentation in addition to linking with the special LSAN > library. > > Thanks, > -Eric Feng > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from thi

Re: Making adaptive redzones less aggressive

2017-07-17 Thread 'Alexander Potapenko' via address-sanitizer
s e.g. char arrays are sometimes used as opaque storage for compound types. Do you have any evidence how big is the memory overhead caused by redzones in this case? > -Y > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer&qu

Re: Stack Variables and Global Variables

2017-06-22 Thread 'Dmitry Vyukov' via address-sanitizer
>>> >>> On 21 Jun 2017, at 04:11, Aayushi Agrawal <aayushigr...@gmail.com> >>> wrote: >>> >>> Hello >>> >>> I used " -fsanitise=address " as one of the option for compiling my >>> program with clang. >>> Bu

Re: Address Sanitizer clashes with Dataflow Sanitizer

2017-06-09 Thread 'Evgenii Stepanov' via address-sanitizer
On Fri, Jun 9, 2017 at 4:26 PM, hariri via address-sanitizer <address-sanitizer@googlegroups.com> wrote: > Thanks for your reply Evgeniy. > >> It could be possible > to hack something, but it does not sound easy > > Could you please give me some pointers into what

Re: Address Sanitizer clashes with Dataflow Sanitizer

2017-06-09 Thread hariri via address-sanitizer
> me how one would tie them together. > > > On Fri, Jun 9, 2017 at 8:52 AM, hariri via address-sanitizer > <address-...@googlegroups.com > wrote: > > Hi, > > > > I am trying to use the dataflow sanitizer with the address sanitizer, > but > >

Re: Address Sanitizer clashes with Dataflow Sanitizer

2017-06-09 Thread 'Evgenii Stepanov' via address-sanitizer
address-sanitizer <address-sanitizer@googlegroups.com> wrote: > Hi, > > I am trying to use the dataflow sanitizer with the address sanitizer, but > they clash together giving me a long sequence of errors due to multiple > definitions in both sanitizers: > > clang-llvm/

Re: Looking for source code of ASan

2017-05-24 Thread 'Dmitry Vyukov' via address-sanitizer
- Eyasu Getahun Chekole > Cc: k...@google.com; bruen...@google.com; gli...@google.com; address-sanitizer > Subject: Re: Looking for source code of ASan > > On Thu, May 4, 2017 at 5:11 PM, PhD - Eyasu Getahun Chekole > <eyasu_chek...@mymail.sutd.edu.sg> wrote: >> Dear all,

Re: ASan on android without rooting device

2017-05-18 Thread 'Evgenii Stepanov' via address-sanitizer
emory and libc issues. >> >> It would be quite valuable for me to be able to run ASan on apps on >> non-rooted phones (even if I could only get a subset of checks to work), so >> I'd be willing to put in a fair amount of work to make it happen, if it's >> the sort o

Re: ASan on android without rooting device

2017-05-18 Thread 'Evgenii Stepanov' via address-sanitizer
ncis > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsubscr...@googlegroups.com. > For mo

Re: Looking for source code of ASan

2017-05-04 Thread 'Dmitry Vyukov' via address-sanitizer
t > with clang. I couldn't find a pointer where to get the source code to do > that. Could you please point me where to get it? Hi Eyasu, The source code is in gcc already (libsanitizer/asan), just build gcc. -- You received this message because you are subscribed to the Google Groups &

Re: Clang and Address Sanitizer

2017-05-02 Thread 'Alexander Potapenko' via address-sanitizer
sue which is not handled by address sanitizer ? > > On 02-May-2017 5:45 pm, "'Alexander Potapenko' via address-sanitizer" > <address-sanitizer@googlegroups.com> wrote: >> >> Most certainly the access to global_array[200] ends up touching a >> valid locat

Re: Clang and Address Sanitizer

2017-05-02 Thread 'Alexander Potapenko' via address-sanitizer
] = 70; > g[atoi(argv[1])] = 'c'; > > } > > If I compile it with clang , address sanitizer and no other flags used then > for input as "101" it gives ASAN buffer overflow message but input as "200" > does not show any buffer overflow why ? > > > Aayushi

Re: ASan on OpenBSD

2017-05-01 Thread 'Dmitry Vyukov' via address-sanitizer
; Currently mapping a mult-TB range doesn't work in OpenBSD. But I > think it could be made to work if most of that range will be mapped > with PROT_NONE. It needs to be mapped with PROT_READ|PROT_WRITE and MAP_NORESERVE. We don't have code that later would detect which parts of t

Re: GetPreviousInstructionPc question

2017-04-20 Thread 'Dmitry Vyukov' via address-sanitizer
On Thu, Apr 20, 2017 at 12:00 PM, Yuri Gribov <tetra2...@gmail.com> wrote: > On Thu, Apr 20, 2017 at 10:53 AM, 'Dmitry Vyukov' via > address-sanitizer <address-sanitizer@googlegroups.com> wrote: >> On Thu, Apr 20, 2017 at 11:50 AM, Yuri Gribov <tetra2...@gmail.com> w

Re: GetPreviousInstructionPc question

2017-04-20 Thread 'Dmitry Vyukov' via address-sanitizer
On Thu, Apr 20, 2017 at 11:50 AM, Yuri Gribov <tetra2...@gmail.com> wrote: > On Thu, Apr 20, 2017 at 10:20 AM, 'Dmitry Vyukov' via > address-sanitizer <address-sanitizer@googlegroups.com> wrote: >> On Thu, Apr 20, 2017 at 11:11 AM, evgeny777 <evgeny.levi...@g

Re: GetPreviousInstructionPc question

2017-04-20 Thread 'Dmitry Vyukov' via address-sanitizer
vial change would >> be to add 1 to PCs pointing to faulting instruction. Then >> GetPreviousInstructionPc will offset this and we get correct debug >> info. However, then we will print incorrect PC in report. So a proper >> fix would be to augment all stack traces with a flag say

Re: GetPreviousInstructionPc question

2017-04-20 Thread 'Dmitry Vyukov' via address-sanitizer
You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: About Asan ASAN_MEMORY_ACCESS_CALLBACK_BODY macro

2016-11-29 Thread 'Dmitry Vyukov' via address-sanitizer
u anyway! > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsubscr...@googlegroups.com. > For m

Re: About Asan ASAN_MEMORY_ACCESS_CALLBACK_BODY macro

2016-11-28 Thread 'Dmitry Vyukov' via address-sanitizer
\ >(s8)s)) { > \ > if (__asan_test_only_reported_buggy_pointer) { > \ > *__asan_test_only_reported_buggy_pointer = addr; > \ > } else { > \ > GET_CALLER_PC_BP_SP; > \ > ReportGenericError(pc, bp, sp, addr, is_write, size, exp_arg,

Re: who calls asan.module_ctor to do the asan module init?

2016-11-10 Thread 'Evgenii Stepanov' via address-sanitizer
pport my firmware? Any suggestion is welcomed. > > > Thanks > Steven Shi > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email

Re: Does LLVM Asan with -fsanitize=kernel-address support check glabal and stack buffer issues?

2016-11-07 Thread 'Dmitry Vyukov' via address-sanitizer
oogle/sanitizers/wiki/AddressSanitizerHowToBuild on how to pass these configs. -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: How to check error log of ASAN in Linux for an xyz.o file?

2016-09-20 Thread 'Alexander Potapenko' via address-sanitizer
l redzone: f4 > Stack after return:f5 > Stack use after scope: f8 > Global redzone:f9 > Global init order: f6 > Poisoned by user: f7 > ASan internal: fe > ==6211== ABORTING > > > > Consider this as my log..how should I analyse

Re: How to check error log of ASAN in Linux for an xyz.o file?

2016-09-17 Thread 'Alexander Potapenko' via address-sanitizer
being reported by ASAN in GCC? > > Though I use verbosity where exactly should I look for is not clear...So > can you please give me some insights on how to analyse? > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer&q

Re: How to check error log of ASAN in Linux for an xyz.o file?

2016-09-16 Thread 'Alexander Potapenko' via address-sanitizer
p 16, 2016 at 1:30 PM, Karthigaasri Thirunavukkarasu <karthigaasri...@gmail.com> wrote: > As you say it is executable file...I want to to know how to track it with > ASAN? > > -- > You received this message because you are subscribed to the Google Groups > "address-

Re: How to check error log of ASAN in Linux for an xyz.o file?

2016-09-15 Thread 'Alexander Potapenko' via address-sanitizer
.o image,I am wondering where can I find the error log > generated by the address sanitizer tool. > > Is it because I missed something or is it because we kill the image once we > are done? > > Can you help me with this? > > -- > You received this message because you are

Re: kAsan runtime address check

2016-08-30 Thread 'Dmitry Vyukov' via address-sanitizer
On Tue, Aug 30, 2016 at 8:42 AM, WookHyun Han <wookhyun...@gmail.com> wrote: > I'm looking address sanitizer instrumentation and found that UseCalls is > enabled when CompileKernel is enabled > > When UseCalls is enabled, instrumentation inserts function calls which check &g

Re: Chromium ASAN builds

2016-08-15 Thread 'Reid Kleckner' via address-sanitizer
get older builds would it > be possible that there's a directory that contains links to only the > latest two or three versions of each build? > > -- > Hanno Böck > https://hboeck.de/ > > mail/jabber: ha...@hboeck.de > GPG: BBB51E42 > > -- > You received this m

Re: UBSan suppressions on embedded system

2016-05-12 Thread 'Ilya' via address-sanitizer
for the UBSan. Greetings, and thanks, Ilya Am Montag, 9. Mai 2016 11:07:49 UTC+2 schrieb Yuri Gribov: > > On Mon, May 9, 2016 at 10:35 AM, 'Ilya' via address-sanitizer > <address-...@googlegroups.com > wrote: > > > >> Worst case you could w

Re: UBSan suppressions on embedded system

2016-05-09 Thread 'Ilya' via address-sanitizer
ot;. -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: UBSan suppressions on embedded system

2016-05-09 Thread 'Ilya' via address-sanitizer
ns. This understanding however might be crucial for me to utilize it to suppress the lasting ubs. The slowdown could be acceptable, so I'm not worrying about that currently. Thanks, Ilya -- You received this message because you are subscribed to the Google Groups "address-sanitizer&q

UBSan suppressions on embedded system

2016-05-03 Thread 'Ilya' via address-sanitizer
u received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: configure scripts, pthread detection and asan

2016-01-20 Thread 'Dmitry Vyukov' via address-sanitizer
an add -lpthread whenever you add -fsanitize=address. -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.

Re: "check_initialization_order=true" command line option?

2016-01-11 Thread 'Reid Kleckner' via address-sanitizer
gt; > What is the command line equivalent of 'check_initialization_order=true'? > > Thanks in advance. > > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop rece

Re: logging both to console and logfile (feature request)

2015-11-02 Thread 'Evgenii Stepanov' via address-sanitizer
t would avoid introducing another flag. Not sure if that > breaks any other use case. > > -- > Hanno Böck > http://hboeck.de/ > > mail/jabber: ha...@hboeck.de > GPG: BBB51E42 > > -- > You received this message because you are subscribed to the Google Groups > "addres

Re: Issue 407 in address-sanitizer: gcc-asan doesn't work on android/arm32

2015-08-21 Thread address-sanitizer
Comment #1 on issue 407 by zhouweig...@gmail.com: gcc-asan doesn't work on android/arm32 https://code.google.com/p/address-sanitizer/issues/detail?id=407 I submitted the same bugs on gcc's bugzilla system. the following is the URL. https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67286 I

Issue 407 in address-sanitizer: gcc-asan doesn't work on android/arm32

2015-08-21 Thread address-sanitizer
Status: New Owner: Labels: Type-Defect Priority-Medium New issue 407 by zhouweig...@gmail.com: gcc-asan doesn't work on android/arm32 https://code.google.com/p/address-sanitizer/issues/detail?id=407 What steps will reproduce the problem? 1.built the testcase invalid-free.cc with cross

Re: Issue 403 in address-sanitizer: Enable LSAN support for 32bit architecture

2015-08-20 Thread address-sanitizer
Updates: Labels: ProjectAddressSanitizer Comment #3 on issue 403 by ramosian.gli...@gmail.com: Enable LSAN support for 32bit architecture https://code.google.com/p/address-sanitizer/issues/detail?id=403 (No comment was entered for this change.) -- You received this message because

Issue 404 in address-sanitizer: support relative paths in backlist files

2015-08-20 Thread address-sanitizer
Status: Accepted Owner: Labels: Type-Defect Priority-Medium New issue 404 by dvyu...@google.com: support relative paths in backlist files https://code.google.com/p/address-sanitizer/issues/detail?id=404 Paths in backlist files must much paths passed to compiler by build system

Re: Blacklist file

2015-08-20 Thread 'Dmitry Vyukov' via address-sanitizer
Wasn't sure where I need to file the issue due to c.g.c closure. Now filed: https://code.google.com/p/address-sanitizer/issues/detail?id=404 On Thu, Aug 13, 2015 at 3:03 PM, Ilya Mirsky ilya.mir...@gmail.com wrote: I agree, it would be best. Is there a ticket I could follow? On Wed, Aug 12

Re: Issue 403 in address-sanitizer: Enable LSAN support for 32bit architecture

2015-08-16 Thread address-sanitizer
Comment #2 on issue 403 by tetra2...@gmail.com: Enable LSAN support for 32bit architecture https://code.google.com/p/address-sanitizer/issues/detail?id=403 As this keeps popping up, perhaps add a descriptive message to #error in lsan header? -- You received this message because

Re: Blacklist file

2015-08-12 Thread 'Dmitry Vyukov' via address-sanitizer
+address-sanitizer Thanks for the report! I guess it is the same for asan as well. I think we need to promote usage of relative paths (absolute paths are not portable between machines), and then match then as suffix of compiled source files. On Wed, Aug 12, 2015 at 1:24 PM, Ilya Mirsky

Re: Issue 403 in address-sanitizer: Enable LSAN support for 32bit architecture

2015-08-10 Thread address-sanitizer
Comment #1 on issue 403 by konstant...@gmail.com: Enable LSAN support for 32bit architecture https://code.google.com/p/address-sanitizer/issues/detail?id=403 This has come up before, including the bug you mentioned above, and it is problematic for the reasons you mostly explained. :) We

99 issues changed in address-sanitizer

2015-07-30 Thread address-sanitizer
Updates: Labels: ProjectAddressSanitizer Comment by ramosian.gli...@gmail.com: (No comment was entered for this change.) Affected issues: issue 7: No redzones for weak symbols http://code.google.com/p/address-sanitizer/issues/detail?id=7 issue 12: need to instrument thread

100 issues changed in address-sanitizer

2015-07-30 Thread address-sanitizer
Updates: Labels: ProjectAddressSanitizer Comment by ramosian.gli...@gmail.com: Adding Project:AddressSanitizer as part of GitHub migration. Affected issues: issue 115: Trivial program crashes with dynamic runtime on Mac http://code.google.com/p/address-sanitizer/issues/detail?id

  1   2   3   4   5   6   7   >